Search results

Jump to: navigation, search
  • File:Unknownaddress.png
    A flow chart demonstrating how an attacker would unmask a Bitcoin user.
    (638 × 158 (2 KB)) - 19:50, 19 December 2010
  • [[File:Unknownaddress.png|thumb|The flow of Bitcoins is highly public.]] ''Taint analysis'' is a technique sometimes used to study the flow of bitcoins and extract privacy-relevant information. If an address A is co
    159 KB (24,866 words) - 08:59, 31 December 2023
  • === Flow control ===
    27 KB (4,450 words) - 22:25, 26 April 2024
  • ...ed in the blockchain, making it very easy for the authorities to track the flow of currency right from its genesis to the last digital wallet it was sent t
    24 KB (3,955 words) - 23:56, 9 January 2018
  • ...inux Kernel development process is being used as the model for how changes flow into the original Bitcoin application:
    2 KB (360 words) - 16:31, 17 June 2020
  • ...ust so long as they don't have to make any decisions that interrupts their flow. Those execution units are contained in blocks. The 5970 uses a VLIW-5 arch
    10 KB (1,680 words) - 16:05, 8 January 2013
  • ...th our society. Undoubtably they have been our crutch in manipulating this flow of noisy data into useful information that we value. More than ever before ...ful works of art, discover profound cosmological insights is based on free flow of ideas across borders and into different media from the camera, to the cd
    26 KB (4,390 words) - 19:36, 30 March 2011
  • ==BIP Work Flow== ...ed a BIP and should be injected into the relevant Bitcoin development work flow with a patch submission to the applicable Bitcoin issue tracker.
    16 KB (2,623 words) - 10:02, 1 January 2021
  • ...ing, of course, referring to the main script - which has access to control flow operations (if/then/else), as well as the ability
    16 KB (2,590 words) - 05:14, 10 January 2015
  • 1) a steady flow of txns will generate some fees even if all public keys remain active. Acti
    31 KB (5,060 words) - 07:40, 26 September 2022
  • ...yment channel:'''<ref name="ln_pdf"/> a payment channel where payments can flow both directions, from Alice to Bob and back to Alice. This is contrasted wi
    23 KB (3,540 words) - 00:24, 13 July 2022
  • ...burnt] coins, the revenue being added as a coin-[re-]minting stream to the flow of fees, ''is'' necessary to continue with forever, for the sake of network
    32 KB (5,261 words) - 12:10, 15 January 2018
  • === Flow control ===
    46 KB (6,560 words) - 20:04, 5 January 2013
  • ...are unidirectional and must be created in pairs for bidirectional payment flow. ...o offset operating costs and cost of capital to lock up money in a payment flow until it's committed or rolled back.
    21 KB (3,387 words) - 17:18, 12 March 2013
  • ...precludes this method, but privacy can still be maintained by breaking the flow of information in another place: by keeping public keys anonymous. The publ
    21 KB (3,427 words) - 18:53, 7 August 2015
  • ...chniques of controlling information flows independently of containing data flow. This cryptographic idea of "separating information flow from data flow" can be put on good mathematical footing, and much progress has been made i
    19 KB (2,977 words) - 13:05, 4 April 2014
  • .../poclbm || -v -w128, fan @ 53%/temp 73C, stock voltage of 1.175v, high air flow case
    131 KB (14,245 words) - 23:09, 13 February 2023
  • For example, the message flow between two peers for a relayed transaction that is rejected for some reaso
    5 KB (662 words) - 21:45, 30 April 2024
  • == Booting flow ==
    3 KB (372 words) - 08:08, 16 November 2015
  • ....).<br>The while(true) loop in ThreadMessageHandler controls the program's flow, signalling <u>main.cpp</u> when there is work to do. <br>Key dependencies:
    15 KB (2,318 words) - 00:41, 24 April 2019
  • ...your bitcoin addresses are. It will know what your business's entire cash flow and income is.
    7 KB (1,153 words) - 15:13, 16 March 2018
  • ===Protocol Flow Examples===
    28 KB (4,234 words) - 18:44, 24 April 2024
  • ...e system has perfect anonymity. The signers cannot know anything about the flow of money.
    9 KB (1,491 words) - 22:53, 15 May 2021
  • <img src="bip-0075/encrypted-invoice-request-process.png" alt="Flow diagram of Encrypted InvoiceRequest"> The following diagram shows a sample flow in which one mobile client is sending value to a second mobile client with
    29 KB (4,013 words) - 17:59, 24 September 2019
  • Information does not flow from <code>stempool</code> to <code>mempool</code>,
    17 KB (2,524 words) - 07:48, 2 August 2020
  • ===Intended Protocol Flow=== <img src=bip-0152/protocol-flow.png></img>
    30 KB (4,803 words) - 21:36, 23 April 2024
  • ===Intended Protocol Flow=== [[File:bip-0330/recon_scheme_merged.png|framed|center|Protocol flow]]
    21 KB (3,293 words) - 21:48, 23 April 2024
  • === Flow control ===
    27 KB (4,399 words) - 13:22, 7 September 2022
  • We first give an informal overview of the entire protocol flow and packet encryption. '''Protocol flow overview'''
    65 KB (9,770 words) - 08:04, 29 September 2023
  • === General Signing Flow === ...hed in actual implementations (see [[#general-signing-flow|General Signing Flow]]).
    68 KB (10,863 words) - 09:27, 14 May 2024
  • destinations, and fee management are all fixed. Funds must flow through a fixed
    43 KB (6,456 words) - 20:33, 23 February 2024
  • ...security concerns, and part of the UX concerns, is to have a registration flow for the wallet policy in the hardware signing device. The ''wallet policy'' ...e. While the details of the process are out of scope in this document, the flow should be something similar to the following:
    26 KB (3,980 words) - 17:22, 13 May 2024